Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for predicting victim users and detecting fake user accounts in online social networks

a fake user and online social network technology, applied in the field of telecommunications, can solve the problems of low detection performance, inability to provide provable security guarantees, and inability to meet the needs of real-world deployment,

Inactive Publication Date: 2015-07-02
TELEFONICA DIGITAL ESPANA
View PDF8 Cites 126 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This patent invention aims to protect social networks from fake accounts that can trick users into connecting with them. It does this by predicting which users are likely to have relationships with fake accounts and then warns them that connecting with these accounts could be risky. This approach helps users make informed decisions and avoid falling prey to these automated attacks. The invention also incorporates a retroactive detection method that can handle a larger number of fake relationships and accounts, ensuring high detection performance with desirable security guarantees. Overall, this invention is efficient and suitable for large social networks with millions of users.

Problems solved by technology

Feature-based detection technique is efficient but does not provide any provable security guarantees.
This way, nodes with rank values close to zero are considered suspicious and represent isolated, fake accounts.
As a result, graph-based detection generally suffers from bad ranking quality, and therefore, low detection performance, rendering it impractical for real-world deployments, including for example multi-community scenarios.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for predicting victim users and detecting fake user accounts in online social networks
  • Method and system for predicting victim users and detecting fake user accounts in online social networks
  • Method and system for predicting victim users and detecting fake user accounts in online social networks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0090]The matters defined in this detailed description are provided to assist in a comprehensive understanding of the invention. Accordingly, those of ordinary skill in the art will recognize that variation changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the invention. Also, description of well-known functions and elements are omitted for clarity and conciseness.

[0091]The embodiments of the invention can be implemented in a variety of architectural platforms, operating and server systems, devices, systems, or applications. Any particular architectural layout or implementation presented herein is provided for purposes of illustration and comprehension only and is not intended to limit aspects of the invention.

[0092]It is within this context, that various embodiments of the invention are now presented with reference to the FIGS. 1-5.

[0093]FIG. 1 presents a social graph G comprising a non-Sybil region GH formed by...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A system and method for predicting victims and detecting fake accounts in OSNs, comprising: a feature-based classifier for predicting victims by classifying, with a classification probability, a target variable of each user in the OSN social graph; a graph-transformer for transforming the social graph into a defense graph by reassigning edge weights to incorporate victim predictions using the classification probability, a graph-based detector for detecting fake users by computing through the power iteration method a probability of a random walk to land on each node in the defense graph after 0(log n) steps, assigning to each node a rank value equal to a node's landing probability normalized by the node degree, sorting the nodes by their rank value and estimating a detection threshold such that each node whose rank value is smaller than the detection threshold is flagged as representing a fake account.

Description

FIELD OF THE INVENTION[0001]The present invention has its application within the telecommunication sector, and especially, relates to Online Social Networking (OSN) services, such as Facebook, Twitter, Digg, LinkedIn, Google+, Tuenti, etc., and their security mechanisms against attacks originating from automated fake user accounts (i.e., Sybil attacks).BACKGROUND OF THE INVENTION[0002]Traditionally, the Sybil attack in computer security represents the situation wherein a reputation system is subverted by forging identities in peer-to-peer networks through creating a large number of pseudonymous identities and then using them to gain a disproportionately large influence. In an electronic network environment, particularly in Online Social Networks (OSNs), Sybil attacks are commonplace due to the open nature of these networks, where an attacker creates multiple fake, each called a Sybil node, and pretends to be multiple real users in the OSN.[0003]Attackers can create fake accounts in ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): H04L29/06
CPCH04L63/1441H04L67/306
Inventor BOSHMAF, YAZANLOGOTHETIS, DIONYSIOSSIGANOS, GEORGIOS
Owner TELEFONICA DIGITAL ESPANA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products